blob: 875bdc725dc408bac102b9f51eb29f4f7df75514 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * Internet Control Message Protocol (ICMPv6)
3 * Linux INET6 implementation
4 *
5 * Authors:
6 * Pedro Roque <roque@di.fc.ul.pt>
7 *
8 * $Id: icmp.c,v 1.38 2002/02/08 03:57:19 davem Exp $
9 *
10 * Based on net/ipv4/icmp.c
11 *
12 * RFC 1885
13 *
14 * This program is free software; you can redistribute it and/or
15 * modify it under the terms of the GNU General Public License
16 * as published by the Free Software Foundation; either version
17 * 2 of the License, or (at your option) any later version.
18 */
19
20/*
21 * Changes:
22 *
23 * Andi Kleen : exception handling
24 * Andi Kleen add rate limits. never reply to a icmp.
25 * add more length checks and other fixes.
26 * yoshfuji : ensure to sent parameter problem for
27 * fragments.
28 * YOSHIFUJI Hideaki @USAGI: added sysctl for icmp rate limit.
29 * Randy Dunlap and
30 * YOSHIFUJI Hideaki @USAGI: Per-interface statistics support
31 * Kazunori MIYAZAWA @USAGI: change output process to use ip6_append_data
32 */
33
34#include <linux/module.h>
35#include <linux/errno.h>
36#include <linux/types.h>
37#include <linux/socket.h>
38#include <linux/in.h>
39#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070040#include <linux/sockios.h>
41#include <linux/net.h>
42#include <linux/skbuff.h>
43#include <linux/init.h>
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -080044#include <linux/netfilter.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070045
46#ifdef CONFIG_SYSCTL
47#include <linux/sysctl.h>
48#endif
49
50#include <linux/inet.h>
51#include <linux/netdevice.h>
52#include <linux/icmpv6.h>
53
54#include <net/ip.h>
55#include <net/sock.h>
56
57#include <net/ipv6.h>
58#include <net/ip6_checksum.h>
59#include <net/protocol.h>
60#include <net/raw.h>
61#include <net/rawv6.h>
62#include <net/transp_v6.h>
63#include <net/ip6_route.h>
64#include <net/addrconf.h>
65#include <net/icmp.h>
Herbert Xu8b7817f2007-12-12 10:44:43 -080066#include <net/xfrm.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070067
68#include <asm/uaccess.h>
69#include <asm/system.h>
70
Eric Dumazetba899662005-08-26 12:05:31 -070071DEFINE_SNMP_STAT(struct icmpv6_mib, icmpv6_statistics) __read_mostly;
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +090072EXPORT_SYMBOL(icmpv6_statistics);
David L Stevens14878f72007-09-16 16:52:35 -070073DEFINE_SNMP_STAT(struct icmpv6msg_mib, icmpv6msg_statistics) __read_mostly;
74EXPORT_SYMBOL(icmpv6msg_statistics);
Linus Torvalds1da177e2005-04-16 15:20:36 -070075
76/*
77 * The ICMP socket(s). This is the most convenient way to flow control
78 * our ICMP output as well as maintain a clean interface throughout
79 * all layers. All Socketless IP sends will soon be gone.
80 *
81 * On SMP we have one ICMP socket per-cpu.
82 */
Denis V. Lunevb7e729c2008-02-29 11:16:08 -080083static DEFINE_PER_CPU(struct sock *, __icmpv6_sk) = NULL;
84#define icmpv6_sk __get_cpu_var(__icmpv6_sk)
Linus Torvalds1da177e2005-04-16 15:20:36 -070085
Herbert Xue5bbef22007-10-15 12:50:28 -070086static int icmpv6_rcv(struct sk_buff *skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -070087
88static struct inet6_protocol icmpv6_protocol = {
89 .handler = icmpv6_rcv,
Herbert Xu8b7817f2007-12-12 10:44:43 -080090 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
Linus Torvalds1da177e2005-04-16 15:20:36 -070091};
92
93static __inline__ int icmpv6_xmit_lock(void)
94{
95 local_bh_disable();
96
Denis V. Lunevb7e729c2008-02-29 11:16:08 -080097 if (unlikely(!spin_trylock(&icmpv6_sk->sk_lock.slock))) {
Linus Torvalds1da177e2005-04-16 15:20:36 -070098 /* This can happen if the output path (f.e. SIT or
99 * ip6ip6 tunnel) signals dst_link_failure() for an
100 * outgoing ICMP6 packet.
101 */
102 local_bh_enable();
103 return 1;
104 }
105 return 0;
106}
107
108static __inline__ void icmpv6_xmit_unlock(void)
109{
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800110 spin_unlock_bh(&icmpv6_sk->sk_lock.slock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111}
112
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900113/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700114 * Slightly more convenient version of icmpv6_send.
115 */
116void icmpv6_param_prob(struct sk_buff *skb, int code, int pos)
117{
118 icmpv6_send(skb, ICMPV6_PARAMPROB, code, pos, skb->dev);
119 kfree_skb(skb);
120}
121
122/*
123 * Figure out, may we reply to this packet with icmp error.
124 *
125 * We do not reply, if:
126 * - it was icmp error message.
127 * - it is truncated, so that it is known, that protocol is ICMPV6
128 * (i.e. in the middle of some exthdr)
129 *
130 * --ANK (980726)
131 */
132
133static int is_ineligible(struct sk_buff *skb)
134{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700135 int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136 int len = skb->len - ptr;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700137 __u8 nexthdr = ipv6_hdr(skb)->nexthdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700138
139 if (len < 0)
140 return 1;
141
Herbert Xu0d3d0772005-04-24 20:16:19 -0700142 ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700143 if (ptr < 0)
144 return 0;
145 if (nexthdr == IPPROTO_ICMPV6) {
146 u8 _type, *tp;
147 tp = skb_header_pointer(skb,
148 ptr+offsetof(struct icmp6hdr, icmp6_type),
149 sizeof(_type), &_type);
150 if (tp == NULL ||
151 !(*tp & ICMPV6_INFOMSG_MASK))
152 return 1;
153 }
154 return 0;
155}
156
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900157/*
158 * Check the ICMP output rate limit
Linus Torvalds1da177e2005-04-16 15:20:36 -0700159 */
160static inline int icmpv6_xrlim_allow(struct sock *sk, int type,
161 struct flowi *fl)
162{
163 struct dst_entry *dst;
164 int res = 0;
165
166 /* Informational messages are not limited. */
167 if (type & ICMPV6_INFOMSG_MASK)
168 return 1;
169
170 /* Do not limit pmtu discovery, it would break it. */
171 if (type == ICMPV6_PKT_TOOBIG)
172 return 1;
173
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900174 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700175 * Look up the output route.
176 * XXX: perhaps the expire for routing entries cloned by
177 * this lookup should be more aggressive (not longer than timeout).
178 */
179 dst = ip6_route_output(sk, fl);
180 if (dst->error) {
YOSHIFUJI Hideakia11d2062006-11-04 20:11:37 +0900181 IP6_INC_STATS(ip6_dst_idev(dst),
182 IPSTATS_MIB_OUTNOROUTES);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700183 } else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) {
184 res = 1;
185 } else {
186 struct rt6_info *rt = (struct rt6_info *)dst;
Daniel Lezcano41a76902008-01-10 03:02:40 -0800187 int tmo = init_net.ipv6.sysctl.icmpv6_time;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700188
189 /* Give more bandwidth to wider prefixes. */
190 if (rt->rt6i_dst.plen < 128)
191 tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
192
193 res = xrlim_allow(dst, tmo);
194 }
195 dst_release(dst);
196 return res;
197}
198
199/*
200 * an inline helper for the "simple" if statement below
201 * checks if parameter problem report is caused by an
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900202 * unrecognized IPv6 option that has the Option Type
Linus Torvalds1da177e2005-04-16 15:20:36 -0700203 * highest-order two bits set to 10
204 */
205
206static __inline__ int opt_unrec(struct sk_buff *skb, __u32 offset)
207{
208 u8 _optval, *op;
209
Arnaldo Carvalho de Melobbe735e2007-03-10 22:16:10 -0300210 offset += skb_network_offset(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700211 op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval);
212 if (op == NULL)
213 return 1;
214 return (*op & 0xC0) == 0x80;
215}
216
217static int icmpv6_push_pending_frames(struct sock *sk, struct flowi *fl, struct icmp6hdr *thdr, int len)
218{
219 struct sk_buff *skb;
220 struct icmp6hdr *icmp6h;
221 int err = 0;
222
223 if ((skb = skb_peek(&sk->sk_write_queue)) == NULL)
224 goto out;
225
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300226 icmp6h = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700227 memcpy(icmp6h, thdr, sizeof(struct icmp6hdr));
228 icmp6h->icmp6_cksum = 0;
229
230 if (skb_queue_len(&sk->sk_write_queue) == 1) {
231 skb->csum = csum_partial((char *)icmp6h,
232 sizeof(struct icmp6hdr), skb->csum);
233 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl->fl6_src,
234 &fl->fl6_dst,
235 len, fl->proto,
236 skb->csum);
237 } else {
Al Viro868c86b2006-11-14 21:35:48 -0800238 __wsum tmp_csum = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700239
240 skb_queue_walk(&sk->sk_write_queue, skb) {
241 tmp_csum = csum_add(tmp_csum, skb->csum);
242 }
243
244 tmp_csum = csum_partial((char *)icmp6h,
245 sizeof(struct icmp6hdr), tmp_csum);
Al Viro868c86b2006-11-14 21:35:48 -0800246 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl->fl6_src,
247 &fl->fl6_dst,
248 len, fl->proto,
249 tmp_csum);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700250 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700251 ip6_push_pending_frames(sk);
252out:
253 return err;
254}
255
256struct icmpv6_msg {
257 struct sk_buff *skb;
258 int offset;
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800259 uint8_t type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700260};
261
262static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
263{
264 struct icmpv6_msg *msg = (struct icmpv6_msg *) from;
265 struct sk_buff *org_skb = msg->skb;
Al Viro5f92a732006-11-14 21:36:54 -0800266 __wsum csum = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700267
268 csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset,
269 to, len, csum);
270 skb->csum = csum_block_add(skb->csum, csum, odd);
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800271 if (!(msg->type & ICMPV6_INFOMSG_MASK))
272 nf_ct_attach(skb, org_skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700273 return 0;
274}
275
Masahide NAKAMURA59fbb3a62007-06-26 23:56:32 -0700276#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700277static void mip6_addr_swap(struct sk_buff *skb)
278{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700279 struct ipv6hdr *iph = ipv6_hdr(skb);
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700280 struct inet6_skb_parm *opt = IP6CB(skb);
281 struct ipv6_destopt_hao *hao;
282 struct in6_addr tmp;
283 int off;
284
285 if (opt->dsthao) {
286 off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
287 if (likely(off >= 0)) {
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700288 hao = (struct ipv6_destopt_hao *)
289 (skb_network_header(skb) + off);
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700290 ipv6_addr_copy(&tmp, &iph->saddr);
291 ipv6_addr_copy(&iph->saddr, &hao->addr);
292 ipv6_addr_copy(&hao->addr, &tmp);
293 }
294 }
295}
296#else
297static inline void mip6_addr_swap(struct sk_buff *skb) {}
298#endif
299
Linus Torvalds1da177e2005-04-16 15:20:36 -0700300/*
301 * Send an ICMP message in response to a packet in error
302 */
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900303void icmpv6_send(struct sk_buff *skb, int type, int code, __u32 info,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700304 struct net_device *dev)
305{
306 struct inet6_dev *idev = NULL;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700307 struct ipv6hdr *hdr = ipv6_hdr(skb);
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700308 struct sock *sk;
309 struct ipv6_pinfo *np;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700310 struct in6_addr *saddr = NULL;
311 struct dst_entry *dst;
Herbert Xu8b7817f2007-12-12 10:44:43 -0800312 struct dst_entry *dst2;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700313 struct icmp6hdr tmp_hdr;
314 struct flowi fl;
Herbert Xu8b7817f2007-12-12 10:44:43 -0800315 struct flowi fl2;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700316 struct icmpv6_msg msg;
317 int iif = 0;
318 int addr_type = 0;
319 int len;
YOSHIFUJI Hideaki41a1f8e2005-09-08 10:19:03 +0900320 int hlimit, tclass;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700321 int err = 0;
322
Arnaldo Carvalho de Melo27a884d2007-04-19 20:29:13 -0700323 if ((u8 *)hdr < skb->head ||
324 (skb->network_header + sizeof(*hdr)) > skb->tail)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700325 return;
326
327 /*
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900328 * Make sure we respect the rules
Linus Torvalds1da177e2005-04-16 15:20:36 -0700329 * i.e. RFC 1885 2.4(e)
330 * Rule (e.1) is enforced by not using icmpv6_send
331 * in any code that processes icmp errors.
332 */
333 addr_type = ipv6_addr_type(&hdr->daddr);
334
Daniel Lezcanobfeade02008-01-10 22:43:18 -0800335 if (ipv6_chk_addr(&init_net, &hdr->daddr, skb->dev, 0))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700336 saddr = &hdr->daddr;
337
338 /*
339 * Dest addr check
340 */
341
342 if ((addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST)) {
343 if (type != ICMPV6_PKT_TOOBIG &&
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900344 !(type == ICMPV6_PARAMPROB &&
345 code == ICMPV6_UNK_OPTION &&
Linus Torvalds1da177e2005-04-16 15:20:36 -0700346 (opt_unrec(skb, info))))
347 return;
348
349 saddr = NULL;
350 }
351
352 addr_type = ipv6_addr_type(&hdr->saddr);
353
354 /*
355 * Source addr check
356 */
357
358 if (addr_type & IPV6_ADDR_LINKLOCAL)
359 iif = skb->dev->ifindex;
360
361 /*
YOSHIFUJI Hideaki8de33512005-12-21 22:57:06 +0900362 * Must not send error if the source does not uniquely
363 * identify a single node (RFC2463 Section 2.4).
364 * We check unspecified / multicast addresses here,
365 * and anycast addresses will be checked later.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700366 */
367 if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
Patrick McHardy64ce2072005-08-09 20:50:53 -0700368 LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: addr_any/mcast source\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700369 return;
370 }
371
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900372 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700373 * Never answer to a ICMP packet.
374 */
375 if (is_ineligible(skb)) {
Patrick McHardy64ce2072005-08-09 20:50:53 -0700376 LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: no reply to icmp error\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700377 return;
378 }
379
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700380 mip6_addr_swap(skb);
381
Linus Torvalds1da177e2005-04-16 15:20:36 -0700382 memset(&fl, 0, sizeof(fl));
383 fl.proto = IPPROTO_ICMPV6;
384 ipv6_addr_copy(&fl.fl6_dst, &hdr->saddr);
385 if (saddr)
386 ipv6_addr_copy(&fl.fl6_src, saddr);
387 fl.oif = iif;
388 fl.fl_icmp_type = type;
389 fl.fl_icmp_code = code;
Venkat Yekkiralabeb8d132006-08-04 23:12:42 -0700390 security_skb_classify_flow(skb, &fl);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700391
392 if (icmpv6_xmit_lock())
393 return;
394
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800395 sk = icmpv6_sk;
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700396 np = inet6_sk(sk);
397
Linus Torvalds1da177e2005-04-16 15:20:36 -0700398 if (!icmpv6_xrlim_allow(sk, type, &fl))
399 goto out;
400
401 tmp_hdr.icmp6_type = type;
402 tmp_hdr.icmp6_code = code;
403 tmp_hdr.icmp6_cksum = 0;
404 tmp_hdr.icmp6_pointer = htonl(info);
405
406 if (!fl.oif && ipv6_addr_is_multicast(&fl.fl6_dst))
407 fl.oif = np->mcast_oif;
408
409 err = ip6_dst_lookup(sk, &dst, &fl);
410 if (err)
411 goto out;
YOSHIFUJI Hideaki8de33512005-12-21 22:57:06 +0900412
413 /*
414 * We won't send icmp if the destination is known
415 * anycast.
416 */
417 if (((struct rt6_info *)dst)->rt6i_flags & RTF_ANYCAST) {
418 LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: acast source\n");
419 goto out_dst_release;
420 }
421
Herbert Xu8b7817f2007-12-12 10:44:43 -0800422 /* No need to clone since we're just using its address. */
423 dst2 = dst;
424
425 err = xfrm_lookup(&dst, &fl, sk, 0);
426 switch (err) {
427 case 0:
428 if (dst != dst2)
429 goto route_done;
430 break;
431 case -EPERM:
432 dst = NULL;
433 break;
434 default:
435 goto out;
436 }
437
438 if (xfrm_decode_session_reverse(skb, &fl2, AF_INET6))
Patrick McHardye104411b2005-09-08 15:11:55 -0700439 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700440
Herbert Xu8b7817f2007-12-12 10:44:43 -0800441 if (ip6_dst_lookup(sk, &dst2, &fl))
442 goto out;
443
444 err = xfrm_lookup(&dst2, &fl, sk, XFRM_LOOKUP_ICMP);
445 if (err == -ENOENT) {
446 if (!dst)
447 goto out;
448 goto route_done;
449 }
450
451 dst_release(dst);
452 dst = dst2;
453
454 if (err)
455 goto out;
456
457route_done:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700458 if (ipv6_addr_is_multicast(&fl.fl6_dst))
459 hlimit = np->mcast_hops;
460 else
461 hlimit = np->hop_limit;
462 if (hlimit < 0)
463 hlimit = dst_metric(dst, RTAX_HOPLIMIT);
464 if (hlimit < 0)
465 hlimit = ipv6_get_hoplimit(dst->dev);
466
YOSHIFUJI Hideakie012d512006-09-13 20:01:28 -0700467 tclass = np->tclass;
YOSHIFUJI Hideaki41a1f8e2005-09-08 10:19:03 +0900468 if (tclass < 0)
469 tclass = 0;
470
Linus Torvalds1da177e2005-04-16 15:20:36 -0700471 msg.skb = skb;
Arnaldo Carvalho de Melobbe735e2007-03-10 22:16:10 -0300472 msg.offset = skb_network_offset(skb);
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800473 msg.type = type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700474
475 len = skb->len - msg.offset;
476 len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) -sizeof(struct icmp6hdr));
477 if (len < 0) {
Patrick McHardy64ce2072005-08-09 20:50:53 -0700478 LIMIT_NETDEBUG(KERN_DEBUG "icmp: len problem\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700479 goto out_dst_release;
480 }
481
482 idev = in6_dev_get(skb->dev);
483
484 err = ip6_append_data(sk, icmpv6_getfrag, &msg,
485 len + sizeof(struct icmp6hdr),
486 sizeof(struct icmp6hdr),
YOSHIFUJI Hideaki41a1f8e2005-09-08 10:19:03 +0900487 hlimit, tclass, NULL, &fl, (struct rt6_info*)dst,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700488 MSG_DONTWAIT);
489 if (err) {
490 ip6_flush_pending_frames(sk);
491 goto out_put;
492 }
493 err = icmpv6_push_pending_frames(sk, &fl, &tmp_hdr, len + sizeof(struct icmp6hdr));
494
Linus Torvalds1da177e2005-04-16 15:20:36 -0700495out_put:
496 if (likely(idev != NULL))
497 in6_dev_put(idev);
498out_dst_release:
499 dst_release(dst);
500out:
501 icmpv6_xmit_unlock();
502}
503
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +0900504EXPORT_SYMBOL(icmpv6_send);
505
Linus Torvalds1da177e2005-04-16 15:20:36 -0700506static void icmpv6_echo_reply(struct sk_buff *skb)
507{
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700508 struct sock *sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700509 struct inet6_dev *idev;
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700510 struct ipv6_pinfo *np;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700511 struct in6_addr *saddr = NULL;
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300512 struct icmp6hdr *icmph = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700513 struct icmp6hdr tmp_hdr;
514 struct flowi fl;
515 struct icmpv6_msg msg;
516 struct dst_entry *dst;
517 int err = 0;
518 int hlimit;
YOSHIFUJI Hideaki41a1f8e2005-09-08 10:19:03 +0900519 int tclass;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700520
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700521 saddr = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700522
523 if (!ipv6_unicast_destination(skb))
524 saddr = NULL;
525
526 memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr));
527 tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY;
528
529 memset(&fl, 0, sizeof(fl));
530 fl.proto = IPPROTO_ICMPV6;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700531 ipv6_addr_copy(&fl.fl6_dst, &ipv6_hdr(skb)->saddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700532 if (saddr)
533 ipv6_addr_copy(&fl.fl6_src, saddr);
534 fl.oif = skb->dev->ifindex;
535 fl.fl_icmp_type = ICMPV6_ECHO_REPLY;
Venkat Yekkiralabeb8d132006-08-04 23:12:42 -0700536 security_skb_classify_flow(skb, &fl);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700537
538 if (icmpv6_xmit_lock())
539 return;
540
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800541 sk = icmpv6_sk;
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700542 np = inet6_sk(sk);
543
Linus Torvalds1da177e2005-04-16 15:20:36 -0700544 if (!fl.oif && ipv6_addr_is_multicast(&fl.fl6_dst))
545 fl.oif = np->mcast_oif;
546
547 err = ip6_dst_lookup(sk, &dst, &fl);
548 if (err)
549 goto out;
550 if ((err = xfrm_lookup(&dst, &fl, sk, 0)) < 0)
Patrick McHardye104411b2005-09-08 15:11:55 -0700551 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700552
553 if (ipv6_addr_is_multicast(&fl.fl6_dst))
554 hlimit = np->mcast_hops;
555 else
556 hlimit = np->hop_limit;
557 if (hlimit < 0)
558 hlimit = dst_metric(dst, RTAX_HOPLIMIT);
559 if (hlimit < 0)
560 hlimit = ipv6_get_hoplimit(dst->dev);
561
YOSHIFUJI Hideakie012d512006-09-13 20:01:28 -0700562 tclass = np->tclass;
YOSHIFUJI Hideaki41a1f8e2005-09-08 10:19:03 +0900563 if (tclass < 0)
564 tclass = 0;
565
Linus Torvalds1da177e2005-04-16 15:20:36 -0700566 idev = in6_dev_get(skb->dev);
567
568 msg.skb = skb;
569 msg.offset = 0;
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800570 msg.type = ICMPV6_ECHO_REPLY;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700571
572 err = ip6_append_data(sk, icmpv6_getfrag, &msg, skb->len + sizeof(struct icmp6hdr),
YOSHIFUJI Hideaki41a1f8e2005-09-08 10:19:03 +0900573 sizeof(struct icmp6hdr), hlimit, tclass, NULL, &fl,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700574 (struct rt6_info*)dst, MSG_DONTWAIT);
575
576 if (err) {
577 ip6_flush_pending_frames(sk);
578 goto out_put;
579 }
580 err = icmpv6_push_pending_frames(sk, &fl, &tmp_hdr, skb->len + sizeof(struct icmp6hdr));
581
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900582out_put:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700583 if (likely(idev != NULL))
584 in6_dev_put(idev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700585 dst_release(dst);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900586out:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700587 icmpv6_xmit_unlock();
588}
589
Al Viro04ce6902006-11-08 00:21:01 -0800590static void icmpv6_notify(struct sk_buff *skb, int type, int code, __be32 info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700591{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700592 struct inet6_protocol *ipprot;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700593 int inner_offset;
594 int hash;
595 u8 nexthdr;
596
597 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
598 return;
599
600 nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr;
601 if (ipv6_ext_hdr(nexthdr)) {
602 /* now skip over extension headers */
Herbert Xu0d3d0772005-04-24 20:16:19 -0700603 inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr), &nexthdr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700604 if (inner_offset<0)
605 return;
606 } else {
607 inner_offset = sizeof(struct ipv6hdr);
608 }
609
610 /* Checkin header including 8 bytes of inner protocol header. */
611 if (!pskb_may_pull(skb, inner_offset+8))
612 return;
613
Linus Torvalds1da177e2005-04-16 15:20:36 -0700614 /* BUGGG_FUTURE: we should try to parse exthdrs in this packet.
615 Without this we will not able f.e. to make source routed
616 pmtu discovery.
617 Corresponding argument (opt) to notifiers is already added.
618 --ANK (980726)
619 */
620
621 hash = nexthdr & (MAX_INET_PROTOS - 1);
622
623 rcu_read_lock();
624 ipprot = rcu_dereference(inet6_protos[hash]);
625 if (ipprot && ipprot->err_handler)
626 ipprot->err_handler(skb, NULL, type, code, inner_offset, info);
627 rcu_read_unlock();
628
Pavel Emelyanov69d6da02007-11-19 22:35:57 -0800629 raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700630}
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900631
Linus Torvalds1da177e2005-04-16 15:20:36 -0700632/*
633 * Handle icmp messages
634 */
635
Herbert Xue5bbef22007-10-15 12:50:28 -0700636static int icmpv6_rcv(struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700637{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700638 struct net_device *dev = skb->dev;
639 struct inet6_dev *idev = __in6_dev_get(dev);
640 struct in6_addr *saddr, *daddr;
641 struct ipv6hdr *orig_hdr;
642 struct icmp6hdr *hdr;
643 int type;
644
Herbert Xuaebcf822007-12-12 18:54:16 -0800645 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
Herbert Xu8b7817f2007-12-12 10:44:43 -0800646 int nh;
647
Herbert Xuaebcf822007-12-12 18:54:16 -0800648 if (!(skb->sp && skb->sp->xvec[skb->sp->len - 1]->props.flags &
649 XFRM_STATE_ICMP))
650 goto drop_no_count;
651
Herbert Xu8b7817f2007-12-12 10:44:43 -0800652 if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(*orig_hdr)))
653 goto drop_no_count;
654
655 nh = skb_network_offset(skb);
656 skb_set_network_header(skb, sizeof(*hdr));
657
658 if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb))
659 goto drop_no_count;
660
661 skb_set_network_header(skb, nh);
662 }
663
Linus Torvalds1da177e2005-04-16 15:20:36 -0700664 ICMP6_INC_STATS_BH(idev, ICMP6_MIB_INMSGS);
665
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700666 saddr = &ipv6_hdr(skb)->saddr;
667 daddr = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700668
669 /* Perform checksum. */
Herbert Xufb286bb2005-11-10 13:01:24 -0800670 switch (skb->ip_summed) {
Patrick McHardy84fa7932006-08-29 16:44:56 -0700671 case CHECKSUM_COMPLETE:
Herbert Xufb286bb2005-11-10 13:01:24 -0800672 if (!csum_ipv6_magic(saddr, daddr, skb->len, IPPROTO_ICMPV6,
673 skb->csum))
674 break;
675 /* fall through */
676 case CHECKSUM_NONE:
Al Viro868c86b2006-11-14 21:35:48 -0800677 skb->csum = ~csum_unfold(csum_ipv6_magic(saddr, daddr, skb->len,
678 IPPROTO_ICMPV6, 0));
Herbert Xufb286bb2005-11-10 13:01:24 -0800679 if (__skb_checksum_complete(skb)) {
Joe Perches46b86a22006-01-13 14:29:07 -0800680 LIMIT_NETDEBUG(KERN_DEBUG "ICMPv6 checksum failed [" NIP6_FMT " > " NIP6_FMT "]\n",
Patrick McHardy64ce2072005-08-09 20:50:53 -0700681 NIP6(*saddr), NIP6(*daddr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700682 goto discard_it;
683 }
684 }
685
Herbert Xu8cf22942008-02-05 03:15:50 -0800686 if (!pskb_pull(skb, sizeof(*hdr)))
687 goto discard_it;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700688
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300689 hdr = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700690
691 type = hdr->icmp6_type;
692
David L Stevens14878f72007-09-16 16:52:35 -0700693 ICMP6MSGIN_INC_STATS_BH(idev, type);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700694
695 switch (type) {
696 case ICMPV6_ECHO_REQUEST:
697 icmpv6_echo_reply(skb);
698 break;
699
700 case ICMPV6_ECHO_REPLY:
701 /* we couldn't care less */
702 break;
703
704 case ICMPV6_PKT_TOOBIG:
705 /* BUGGG_FUTURE: if packet contains rthdr, we cannot update
706 standard destination cache. Seems, only "advanced"
707 destination cache will allow to solve this problem
708 --ANK (980726)
709 */
710 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
711 goto discard_it;
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300712 hdr = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700713 orig_hdr = (struct ipv6hdr *) (hdr + 1);
714 rt6_pmtu_discovery(&orig_hdr->daddr, &orig_hdr->saddr, dev,
715 ntohl(hdr->icmp6_mtu));
716
717 /*
718 * Drop through to notify
719 */
720
721 case ICMPV6_DEST_UNREACH:
722 case ICMPV6_TIME_EXCEED:
723 case ICMPV6_PARAMPROB:
724 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
725 break;
726
727 case NDISC_ROUTER_SOLICITATION:
728 case NDISC_ROUTER_ADVERTISEMENT:
729 case NDISC_NEIGHBOUR_SOLICITATION:
730 case NDISC_NEIGHBOUR_ADVERTISEMENT:
731 case NDISC_REDIRECT:
732 ndisc_rcv(skb);
733 break;
734
735 case ICMPV6_MGM_QUERY:
736 igmp6_event_query(skb);
737 break;
738
739 case ICMPV6_MGM_REPORT:
740 igmp6_event_report(skb);
741 break;
742
743 case ICMPV6_MGM_REDUCTION:
744 case ICMPV6_NI_QUERY:
745 case ICMPV6_NI_REPLY:
746 case ICMPV6_MLD2_REPORT:
747 case ICMPV6_DHAAD_REQUEST:
748 case ICMPV6_DHAAD_REPLY:
749 case ICMPV6_MOBILE_PREFIX_SOL:
750 case ICMPV6_MOBILE_PREFIX_ADV:
751 break;
752
753 default:
Patrick McHardy64ce2072005-08-09 20:50:53 -0700754 LIMIT_NETDEBUG(KERN_DEBUG "icmpv6: msg of unknown type\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700755
756 /* informational */
757 if (type & ICMPV6_INFOMSG_MASK)
758 break;
759
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900760 /*
761 * error of unknown type.
762 * must pass to upper level
Linus Torvalds1da177e2005-04-16 15:20:36 -0700763 */
764
765 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700766 }
767
Linus Torvalds1da177e2005-04-16 15:20:36 -0700768 kfree_skb(skb);
769 return 0;
770
771discard_it:
772 ICMP6_INC_STATS_BH(idev, ICMP6_MIB_INERRORS);
Herbert Xu8b7817f2007-12-12 10:44:43 -0800773drop_no_count:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700774 kfree_skb(skb);
775 return 0;
776}
777
Ingo Molnar640c41c2006-08-15 00:06:56 -0700778/*
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800779 * Special lock-class for __icmpv6_sk:
Ingo Molnar640c41c2006-08-15 00:06:56 -0700780 */
781static struct lock_class_key icmpv6_socket_sk_dst_lock_key;
782
Denis V. Lunev9b0f9762008-02-29 11:13:15 -0800783int __init icmpv6_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700784{
785 struct sock *sk;
786 int err, i, j;
787
KAMEZAWA Hiroyuki6f912042006-04-10 22:52:50 -0700788 for_each_possible_cpu(i) {
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800789 struct socket *sock;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700790 err = sock_create_kern(PF_INET6, SOCK_RAW, IPPROTO_ICMPV6,
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800791 &sock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700792 if (err < 0) {
793 printk(KERN_ERR
794 "Failed to initialize the ICMP6 control socket "
795 "(err %d).\n",
796 err);
797 goto fail;
798 }
799
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800800 per_cpu(__icmpv6_sk, i) = sk = sock->sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700801 sk->sk_allocation = GFP_ATOMIC;
Ingo Molnar640c41c2006-08-15 00:06:56 -0700802 /*
803 * Split off their lock-class, because sk->sk_dst_lock
804 * gets used from softirqs, which is safe for
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800805 * __icmpv6_sk (because those never get directly used
Ingo Molnar640c41c2006-08-15 00:06:56 -0700806 * via userspace syscalls), but unsafe for normal sockets.
807 */
808 lockdep_set_class(&sk->sk_dst_lock,
809 &icmpv6_socket_sk_dst_lock_key);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700810
811 /* Enough space for 2 64K ICMP packets, including
812 * sk_buff struct overhead.
813 */
814 sk->sk_sndbuf =
815 (2 * ((64 * 1024) + sizeof(struct sk_buff)));
816
817 sk->sk_prot->unhash(sk);
818 }
819
820
821 if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0) {
822 printk(KERN_ERR "Failed to register ICMP6 protocol\n");
823 err = -EAGAIN;
824 goto fail;
825 }
826
827 return 0;
828
829 fail:
830 for (j = 0; j < i; j++) {
831 if (!cpu_possible(j))
832 continue;
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800833 sock_release(per_cpu(__icmpv6_sk, j)->sk_socket);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700834 }
835
836 return err;
837}
838
839void icmpv6_cleanup(void)
840{
841 int i;
842
KAMEZAWA Hiroyuki6f912042006-04-10 22:52:50 -0700843 for_each_possible_cpu(i) {
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800844 sock_release(per_cpu(__icmpv6_sk, i)->sk_socket);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700845 }
846 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
847}
848
Arjan van de Ven9b5b5cf2005-11-29 16:21:38 -0800849static const struct icmp6_err {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700850 int err;
851 int fatal;
852} tab_unreach[] = {
853 { /* NOROUTE */
854 .err = ENETUNREACH,
855 .fatal = 0,
856 },
857 { /* ADM_PROHIBITED */
858 .err = EACCES,
859 .fatal = 1,
860 },
861 { /* Was NOT_NEIGHBOUR, now reserved */
862 .err = EHOSTUNREACH,
863 .fatal = 0,
864 },
865 { /* ADDR_UNREACH */
866 .err = EHOSTUNREACH,
867 .fatal = 0,
868 },
869 { /* PORT_UNREACH */
870 .err = ECONNREFUSED,
871 .fatal = 1,
872 },
873};
874
875int icmpv6_err_convert(int type, int code, int *err)
876{
877 int fatal = 0;
878
879 *err = EPROTO;
880
881 switch (type) {
882 case ICMPV6_DEST_UNREACH:
883 fatal = 1;
884 if (code <= ICMPV6_PORT_UNREACH) {
885 *err = tab_unreach[code].err;
886 fatal = tab_unreach[code].fatal;
887 }
888 break;
889
890 case ICMPV6_PKT_TOOBIG:
891 *err = EMSGSIZE;
892 break;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900893
Linus Torvalds1da177e2005-04-16 15:20:36 -0700894 case ICMPV6_PARAMPROB:
895 *err = EPROTO;
896 fatal = 1;
897 break;
898
899 case ICMPV6_TIME_EXCEED:
900 *err = EHOSTUNREACH;
901 break;
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700902 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700903
904 return fatal;
905}
906
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +0900907EXPORT_SYMBOL(icmpv6_err_convert);
908
Linus Torvalds1da177e2005-04-16 15:20:36 -0700909#ifdef CONFIG_SYSCTL
Daniel Lezcano760f2d02008-01-10 02:53:43 -0800910ctl_table ipv6_icmp_table_template[] = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700911 {
912 .ctl_name = NET_IPV6_ICMP_RATELIMIT,
913 .procname = "ratelimit",
Daniel Lezcano41a76902008-01-10 03:02:40 -0800914 .data = &init_net.ipv6.sysctl.icmpv6_time,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700915 .maxlen = sizeof(int),
916 .mode = 0644,
917 .proc_handler = &proc_dointvec
918 },
919 { .ctl_name = 0 },
920};
Daniel Lezcano760f2d02008-01-10 02:53:43 -0800921
922struct ctl_table *ipv6_icmp_sysctl_init(struct net *net)
923{
924 struct ctl_table *table;
925
926 table = kmemdup(ipv6_icmp_table_template,
927 sizeof(ipv6_icmp_table_template),
928 GFP_KERNEL);
929 return table;
930}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700931#endif
932